Question : Which of the following permissions can be implemented using IAM? A. Installing Anti-virus on windows based EC2 instance B. Launching new Amazon EC2 Instance C. Query the data from Amazon MySQL RDS instance D. Sending Cloud watch alarm to SNS queue and from there on mobile application.
Correct Answer : Get Lastest Questions and Answer : Explanation: : Please keep in mind AWS IAM policy can only be used to authorize a Principal, what he can do with the AWS resources and not for OS or application user. Hence, Installing Anti-virus on windows machine require OS user and not IAM user. Similarly querying data from RDS instance can be govern by the user created in Database instance, it has nothing to do with the AWS resources.
Question : You are working with a Big Finance company, who is using AWS IT infrastructure. However, there are many issues related to security and your chief technical architect asked you implement following things. Which of the following you can have as part of IAM security policy A. Implementing password policies B. Enable Multi Factor Authentication C. Enabling NACL to restrict access on private subnet D. Creating proper security rules insecurity group
Correct Answer : Get Lastest Questions and Answer : Explanation: : In the given option NACL and Security Group has nothing to do with IAM policy. They are related to network security. You can implement password change policy and enable MFA using IAM.
Question : You are working under AWS chief technical architect and he suggested that you should always use IAM roles and not the Principal Credential directly, what are the all benefits you see in this case? A. When you use IAM Role, you are not worried about credential theft or miss use. B. When you use IAM Role, you don’t have to regularly rotate the access keys. C. All the AWS Access resource policies are not required to be created. D. You can very easily integrate with Kerberos for authentication
Correct Answer : Get Lastest Questions and Answer : Explanation: When you create IAM Role, you don’t have to store Principal Credential in any of the configuration files. Based on Assume Roles an application or principal can access the AWS resources. Also, there are no access keys in case of IAM Role, hence you don’t have to rotate them. But policies certainly you have to create to define what role can do and cannot do. There is no need of Kerberos authentication with the IAM Principals and Roles.
1. Modify the routing table for the public subnet to allow a route out for the new instance. 2. Assign an elastic IP address to the fourth instance. 3. Access Mostly Uused Products by 50000+ Subscribers 4. Configure a publically routable IP address in the host OS of the fourth instance.